Featured Content

The digitisation of networks has brought a fair share of risks for ICS to be cyber attacked. Download this interview from , Professor Helge Janicke, Director of the Cyber Technology Institute at De Montfort University, who will be speaking at this year’s ICS Cyber Security conference, to learn more about:

How organisations can best manage the risks associated with a digitised real-time data analysing system

The current state of ICS instant response capability

What is key in securing the digitised network connected to ICS and ensuring an effective incident response

This infographic shows a global overview of the evolution of threatsand their financial damage on organisations, and differences in countries and sectors across the globe. The data is based on interviews from more than 2,200 IT, compliance and data protection professionals from 477 companies in 15 different countries, that have had a data breach from mid 2017 to mid 2018.

Annual Survey on Spend and Trends in Cyber Security

Cyber Security Hub fielded an email survey to subscribers in October 2018 to identify enterprise cyber security trends, among cyber security project owners with direct responsibility and cyber security organizational influencers. This report combines both quantitative and qualitative data for a look at our readers’ views on these pressing questions and more:

• What is the most dangerous threat vector?

• What is the one area of cyber security that needs to change the most in 2019?

IIoT Disruptions Could Cost Millions As Network Widens

It’s no secret that the “Internet of Things” (IoT) is one of the next big discussion points in the cyber security space. That is, security practitioners are actively seeking ways to shore up defense and get a handle of the network.

Cyber security solutions are in place for industrial control systems, and yet the gap between OT and IT is not addressed, leaving a risk for organisations' cyber security. The challenge now is to mitigate it, by improving the communication between these two departments and assess who is liable for the cyber security.

Ahead of ICS Cyber Security 2018, we had the opportunity to discuss with Andy Oliver, current Project Manager for OT Cyber Security at a major pharma company and speaker at the event, on the need for a OT/IT convergence and what strategy organisations need to implement to ensure the digital safety of their organisation.

As industrial control systems (ICS) and process control network (PCN) environments become more connected, “security by obscurity” is no longer an adequate strategy. Sophisticated adversaries have begun to take notice of vulnerabilities found in today’s operational environments. The ICS/PCN Cybersecurity Assessment evaluates technology and network defense processes to measure the overall corporate risk, identify risk mitigation opportunities, and improve control system security.

2016 saw cyber criminals continue to become ever smarter, more efficient and increasingly successful at penetrating industrial networks. Industrial control systems (ICS) operators reported more security incidents to their governing authorities than in any year to date. In this video, we talk to cyber security experts about the biggest problems they perceive in the arena now and in the near future, for the critical infrastructure that underpins so much of daily life.

The number of cyber attacks is on the rise and Industrial Control Systems must be secured, in order for global organisations to avoid suffering real, physical damage.

Ahead of the ICS Cyber Security conference, more than 350 experts from all around the world have answered our recent survey and shared their views on the nature of the cyber threat, implementing solutions and in what time frame and their thoughts on the through-life support offered by the industry.

In February 2017, two researchers at the Georgia Institute of Technology simulated a cyber attack on a water treatment plant. Using ransomware, the academics managed to access programmable logic controllers (PLCs) to shut off valves, increase the chlorine content of water and show false information on computer displays.

The ICS world is riddled with weaknesses that are ready to be exploited by switched-on wrongdoers for currency and chaos. In this analysis we look at the most dangerous roots of ICS breach and how to best prevent them.

Cyber security solutions are already in place in various sectors to secure ICS from attacks, but assaults keep happening. This poses now the challenge to assess whether these solutions are enough to protect both digital and physical assets.

Ahead of the ICS Cyber Security conference, we recently surveyed more than 350 experts on their views on the maturity of their cyber security and balanced their answers with an expert insight from Professor Chris Hankin, co-Director of the Institute for Security Science and Technology at the Imperial College London and speaker at the conference.

On the 28th January 2018 the UK government announced that organisations working in critical services like energy, transport, water and health can be fined up to £17 million ($24 million) as a “last resort” if they fail to demonstrate that their cyber security systems are equipped adequately against attacks. Read the full press release here.

Anthony Leather, Senior Consultant for Aerospace, Defense and Security at Frost & Sullivan, presents the top 10 cyber threats facing critical national infrastructure based on detailed analysis of the most recent incidents. According to Leather, the cyber threat will be the number one risk for the next 20 years. Governments and industry must engage with the cyber threat now in a more strategic and meaningful way than has so far been achieved.